Inverted pattern approach to improve image quality of information hiding by LSB substitution

被引:102
作者
Yang, Cheng-Hsing [1 ]
机构
[1] Natl Pingtung Univ Educ, Dept Comp Sci, Pingtung 900, Taiwan
关键词
LSB substitution; information hiding; image-processing; security;
D O I
10.1016/j.patcog.2008.01.019
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Capacity and invisibility are two targets of the methods for information hiding. Because these two targets contradict each other, to hide large messages into the cover image and remain invisible is an interesting challenge. The simple least-significant-bit (LSB) substitution approach, which embeds secret messages into the LSB of pixels in cover images, usually embeds huge secret messages. After a large message is embedded, the quality of the stego-image will be significantly degraded. In this paper, a new LSB-based method, called the inverted pattern (IP) LSB substitution approach, is proposed to improve the quality of the stego-image. Each section of secret images is determined to be inverted or not inverted before it is embedded. The decisions are recorded by an IP for the purpose of extracting data and the pattern can be seen as a secret key or an extra data to be re-embedded. The experimental results show that our proposed method runs fast and has better results than that of previous works. (c) 2008 Elsevier Ltd. All rights reserved.
引用
收藏
页码:2674 / 2683
页数:10
相关论文
共 28 条
[1]  
[Anonymous], 2007, P 1 INT C UB INF MAN
[2]   Lossless generalized-LSB data embedding [J].
Celik, MU ;
Sharma, G ;
Tekalp, AM ;
Saber, E .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2005, 14 (02) :253-266
[3]   Hierarchical watermarking for secure image authentication with localization [J].
Celik, MU ;
Sharma, G ;
Saber, E ;
Tekalp, AM .
IEEE TRANSACTIONS ON IMAGE PROCESSING, 2002, 11 (06) :585-595
[4]   Hiding data in images by simple LSB substitution [J].
Chan, CK ;
Cheng, LM .
PATTERN RECOGNITION, 2004, 37 (03) :469-474
[5]   Improved hiding data in images by optimal moderately-significant-bit replacement [J].
Chan, CK ;
Cheng, LM .
ELECTRONICS LETTERS, 2001, 37 (16) :1017-1018
[6]   A steganographic method for digital images using side match [J].
Chang, CC ;
Tseng, HW .
PATTERN RECOGNITION LETTERS, 2004, 25 (12) :1431-1437
[7]   Hiding data in multitone images for data communications [J].
Chang, CC ;
Chuang, JC ;
Lai, YP .
IEE PROCEEDINGS-VISION IMAGE AND SIGNAL PROCESSING, 2004, 151 (02) :137-145
[8]   Finding optimal least-significant-bit substitution in image hiding by dynamic programming strategy [J].
Chang, CC ;
Hsiao, JY ;
Chan, CS .
PATTERN RECOGNITION, 2003, 36 (07) :1583-1595
[9]   New image steganographic methods using run-length approach [J].
Chang, Chin-Chen ;
Lin, Chih-Yang ;
Wang, Yu-Zheng .
INFORMATION SCIENCES, 2006, 176 (22) :3393-3408
[10]  
Harada A, 2006, LECT NOTES COMPUT SC, V3853, P338